About

The Founder

In addition to 20 years of industry experience, Eric Wheeler holds a Master of Science Degree in Computer Science from Portland State University and a Graduate Security Certificate certified by the National Security Agency (NSTISSI-4011). In addition, Mr. Wheeler actively researches, designs, and implements network and computer and telephone security systems.

Credentials

To understand Eric’s background, one must understand what it means to attain a Master of Science degree and NSTISSI-4011 certificate through Portland State University. Formal education provides a foundation for twenty years of industry experience, so this discussion scratches only the surface of his experience, skill and expertise.

Portland State University is one of the leading institutions for Computer Science; its students and faculty and continue to publish industry leading papers on a diverse set of topics.

PSU has been recognized as a Center of Academic Excellence (one of 50 in US) by the National Security Agency since 2003 and provides the National INFOSEC Education and Training Program (NIETP) as specified by NSTISSC Training Standard 4011. In addition, the Master of Science program in Computer Science is recognized by the Committee on National Security Systems. Little more needs to be said on the subject, and it is clear that the Computer Science Department at PSU holds a top-notch program.

Obtaining a Master’s degree in Computer Science at Portland State University requires the completion of one degree track; not to be outdone, Eric completed three: Security, Systems, and Theory, in addition to the NSTISSI-4011 NSA certified graduate certificate.

Each degree track requires the completion of a series of courses designed to provide specific training in that subject. Each graduate-level course taken to achieve this is detailed below in alphabetical order. (Course descriptions are taken from the CECS Course List and Eric’s comments are in italic.)

Advanced Technical Writing – Professor Tracy Dillon – [This course] assumes that participants have completed introductory technical writing and technical report writing courses and have vocational interests in the field. In other words, you likely are a “professional” professional writer, whether you intend to become a technical writer or to exercise your writing skills in order to enhance your ability to achieve personal and career goals. On the most fundamental level, [this course] promotes writing as a process for exchanging ideas, expressing yourself, and contributing to an existing body of knowledge in your field. The course also asks you to think epistemologically about the writing you do and receive. You have two primary writing assignments that should take up most of your time. You’ll write an article and try to get it published, and you’ll complete a discourse community journal.

Cryptography – Assistant Professor Thomas Shrimpton – This is a course in modern cryptography emphasizing formal definitions and proofs of security. Core topics include private- and public-key schemes for encryption and message authentication, cryptographic hash functions, and authenticated encryption schemes. Additionally, the course may include some analysis of the DES and AES block-ciphers, and real-world security protocols such as WEP, SSH/TLS and IPSec.

Inter-networking Protocols – Professor Manoj Garg – Advanced study of the protocols and algorithms used in the Internet (IETF) family of networking protocols. For example, ARP, IP, UDP. TCP, multicast, routing protocols like RIP and OSPF, and application protocols like DNS, NFS, SNMP, FTP and HTTP. Issues such as addressing, name service, protocol design, and scalability will be explored.

Introduction to Security Professors James Hook and Jim Binkley – Provides a broad overview of computer security. Provides a solid theoretical foundation, as well as real-world examples, for understanding computer security. Fundamental theoretical results, foundational models, and salient examples will be covered. Security in computer operating systems, networks, and data will be covered, with emphasis on operating system and program security.

Malicious Code and Forensics – Instructor Francis Chang – This course will study the motivations of malicious code developers and the common weaknesses exploited by such code. The course will then move in to a forensics analysis of techniques for protection and recovery from such malicious code. Students are expected to gain insights into the field of computer forensics, specifically approaches for the identification and remedy of malicious code.The course project was to instrument arbitrary code execution attack via stack overflow on existing binary application code

Network Management & Security – Jim Binkley – This is an advanced study of network security. Topics include historical and recent network-based attacks including denial of service attacks, a study of network security monitoring procedures including anomaly and signature-based detection, firewalls, and an in-depth study of defensive techniques at various layers of the ISO stack, including modern cryptographic protocols like IPSEC, SSL, and other application-layer security protocols.The course was organized as a network-lab capture the flag game: Secure and protect your system— and break into the other teams’ systems. There were 5 teams total, ours and four others. The team I led fully compromised two teams’ systems (gained root access) and maintained full access to all four of the other teams’ “secure” website page where they reported their status to the Professor. Our team lead the project with 210 “points” for various attack forms, more than double the next team in the running.

Parallel Algorithms – Professor Laszlo Csanky – Definition and nature of parallel computation. Parallel computation from the point of view of hardware/architecture, program/scheduling, and algorithms. Why and how parallel computation is different from serial computation. Examples to highlight the differences. Parallel algorithms in general: illustration of the most important features and techniques. Illustration of the limitations. A survey of major results, general form of results, and limitations on speed-up.

Relational Database Management – Professor Lois Delcambre – Definition and nature of parallel computation. Parallel computation from the point of view of hardware/architecture, program/scheduling, and algorithms. Why and how parallel computation is different from serial computation. Examples to highlight the differences. Parallel algorithms in general: illustration of the most important features and techniques. Illustration of the limitations. A survey of major results, general form of results, and limitations on speed-up.

Special Topics in Networking – Professor Suresh Singh – This course surveyed a wide variety of published modern academic and industry papers covering topics of Internet security, measurement, anomalies, broadband and wireless technologies.

Wireless Network Concepts – Professor Suresh Singh – Students will be introduced to emerging wireless networks with particular emphasis on protocol analysis. Using probabilistic and simulation techniques, the performance of protocols such as ALOHA, CSMA, and 802.11 will be studied. In addition, challenges related to multi-hop wireless networks will also be studied in some detail. The impact of wireless channels on higher layer protocols such as TCP will be described and proposed solutions discussed. Issues relating to the use of adaptive antenna arrays and directional antennas in wireless networks will be studied in some depth.

Corporation

eWheeler, Inc. operates dba Global Linux Security for national and international customers, and dba Portland Linux Support for local support in Portland Oregon, who sometimes prefer on-site service.

Eric Wheeler,
President
—Qualifications

National Security Agency
Certified via NSTISSI-4011
Training Standard

Over 22 Years of Linux
Since 1996

—

Master of Science
Computer Science

Bachelor of Science
Computer Science

Linux Global Security has been providing our company’s IT support for the past few years. We always get a very fast response and solution to our problems. Great A+ service and highly recommended!

Robert DiMaggio, CEOIronMag Labs

Working with Global Linux Security has been a true pleasure. When I joined MedXCom, I had a huge task in stabilizing and fixing our software while migrating it all into the cloud. Looking back over the last year and a half, I can’t see how we could have ended up with a better solution without his help.

Jason Berry, Lead DeveloperMedXCom

I requested help to configure an email server and Eric did an excellent job of setting that up for me.

Charlie KreiderAviation Weather

I know you are always on top of things, and I trust you. I know I am being taken care of and I know you always do the best you can under the different circumstances you are confronted with. You always follow through, and follow-up. You communicate well. Your prices and charges are fair. You work quickly.

Joe Crestuk, President/CEO
webSURGE digital marketing

Eric is extremely knowledgable and efficient. His understanding of servers and security is top notch.

Eric SteenstraCommerce Strategies

We have been completely satisfied with the level of service, expertise, and professionalism that we receive from you on an ongoing basis. I sleep better at night knowing that our servers and network are constantly updated, secured, and monitored. We are still a small company but we are growing fast and we look forward to expanding our relationship with you as we continue to grow.

Bob DuncanBlindster.com

Eric and his team are top-notch Linux experts. We had a server compromised with malware a few years ago which Eric was able to migrate to a new server, patch and mitigate in fairly short order.

Joe Crestuk, President/CEOwebSURGE digital marketing

We have always received great service from Eric and his team when we have issues to deal with.

Sande CaplinSande Caplin & Associates

The experience with your company has been extraordinary; the response time has been quick and everything is resolved timely and professionally. Every solution has included an explanation which has been very helpful. Another point is on your website you make the comment “There is not a problem we cannot resolve”. Well in my case this has been accurate.

You have been able to recover logs and to help us ferret out hacking issues which have been a continuing problem for us, especially since we are in the elections industry. I feel very confident in the security of our web servers as you have protected them with certificates and monitoring.

Jon Winchester
Logicworks Systems, Inc.

Our experience with your service was excellent. I appreciated the quick, professional response. The Linux world can be challenging but your expertise made the project seem simple!

Mark Woodbury, IT ManagerSlidematic Precision Components

I have used Eric Wheeler and his team at Global Linux Security multiple times. There is a reason for this: if you want the highest level of professional skill and a take charge attitude, Global Linux Security is the company for you. We’ve truly found that Eric and his company just get it done––once you give them a problem to tackle they solve it and they solve it quickly.

Wayne D. McFarland, Managing PartnerVexillum LLC

Eric is very knowledgable in his area of expertise. He is fast with communication and very easy to work with.

Matt Prados, FounderGotcha Local

We’ve been using Linux Global to take care of our web server and network for several years now. In short, they are great. Always quick to respond, and always fix the problem. They are super easy to deal with and to understand- and very fairly priced. With Linux Global on board, our network and server worries are way down. If something happens, they will be right on it. Very highly recommended.

Pat FranzTerraCycle, Inc.

Tell us how we may be of service

Please tell us about yourself so we can get started:

(Use this form or email us directly at [JAVASCRIPT IS REQUIRED (Spam Countermeasure)].

The more information you provide, the more we can help.All of this content is private: this is only to contact you and never used by any third party.